Hi,
we are using the Jira REST Java Client (JRJC) in the newest version (5.2.1). Thanks for providing such an extensive client!
The client brings the dependency com.sun.jersey:jersey-client with it in version 1.19.
Jersey moved to a new group id: org.glassfish.jersey.core:jersey-client which is available in 2.31.
The problem with the com.sun.jersey:jersey-client is that it brings org.codehaus.jackson:jackson-mapper-asl (version 1.9.2) with it which has multiple vulnerabilities (CVE-2018-14718, CVE-2018-5968, CVE-2020-10673, CVE-2018-7489, CVE-2019-14540, CVE-2019-14893, CVE-2017-17485, CVE-2018-1000873).
Is there any chance you upgrade to a new version of jersey-client to fix these security incidents?
Thanks!
Sebastian
what is the current status of the request, unfortunately I cannot read it
Hi Sebastian,
I contacted the Atlassian support and they created an issue:
https://jira.atlassian.com/browse/JRASERVER-72920
Best regards
Alexander
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
what is the current status of the request, unfortunately I cannot read it
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.